Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved reversible image watermarking algorithm based on difference expansion., , , , and . IJDSN, (2017)ATOS: Adaptive Program Tracing With Online Control Flow Graph Support., , , , , and . IEEE Access, (2019)Adaptive reversible image watermarking algorithm based on DE., , , , and . KSII Trans. Internet Inf. Syst., 11 (3): 1761-1784 (2017)基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model)., , and . 计算机科学, 46 (11): 123-129 (2019)一种基于域知识的协议状态机主动推断算法 (Domain-specific Algorithm of Protocol State Machine Active Inference)., , , , and . 计算机科学, 42 (12): 233-239 (2015)Using Semantic Web Techniques to Implement Access Control for Web Service., , , , and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 258-266. Springer, (2010)High-speed anomaly traffic detection based on staged frequency domain features., , , , and . J. Inf. Secur. Appl., (September 2023)Icefex: Protocol Format Extraction from IL-based Concolic Execution., , , , , and . KSII Trans. Internet Inf. Syst., 7 (3): 576-599 (2013)Deep learning-based personality recognition from text posts of online social networks., , , , , , , and . Appl. Intell., 48 (11): 4232-4246 (2018)An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model., , , and . Comput. Secur., (May 2023)